The PING Personally Controlled Electronic Medical Record System: Technical Architecture

Size: px
Start display at page:

Download "The PING Personally Controlled Electronic Medical Record System: Technical Architecture"

Transcription

1 Journal of the American Medical Informatics Association Volume 12 Number 1 Jan / Feb Original JAMIA Investigations Model Formulation j The PING Personally Controlled Electronic Medical Record System: Technical Architecture WILLIAM W. SIMONS, MS,KENNETH D. MANDL, MD,MPH,ISAAC S. KOHANE, MD,PHD Abstract Despite progress in creating standardized clinical data models and interapplication protocols, the goal of creating a lifelong health care record remains mired in the pragmatics of interinstitutional competition, concerns about privacy and unnecessary disclosure, and the lack of a nationwide system for authenticating and authorizing access to medical information. The authors describe the architecture of a personally controlled health care record system, PING, that is not institutionally bound, is a free and open source, and meets the policy requirements that the authors have previously identified for health care delivery and population-wide research. j J Am Med Inform Assoc. 2005;12: DOI /jamia.M1592. Affiliations of the authors: Children s Hospital Informatics Program (WWS, KDM, ISK), Division of Emergency Medicine (WWS, KDM), and Division of Endocrinology (ISK), Children s Hospital Boston, Boston, MA; Harvard Medical School, Boston, MA (KDM, ISK). Supported by the National Library of Medicine through contracts N01-LM and N01-LM The authors thank Matvey B. Palchuk, MD, MS, for his work on developing the original PING clinical document data model and access control model. They are grateful to Ulrich Sax, PhD, and Lucas Jordan for their ongoing effort in defining the new PING record and clinical document data models. Correspondence and reprints: William W. Simons, MS, Children s Hospital Informatics Program, Enders 1, 300 Longwood Avenue, Boston, MA 02115; <william.simons@childrens.harvard.edu>. Received for publication: 03/26/04; accepted for publication: 09/21/04. The recently released strategic framework for the National Health Information Infrastructure calls for the creation of personal health records. 1 Personally controlled health records 2,3 represent a subset of the possible implementations of personal health records in that they are designed to exist outside the administrative structures of any particular health care institution. 1,4,5 Most existing personal health record systems are institution- or company-specific repositories for health information. 6 We have designed and implemented an instance of an interoperable, personally controlled health record that we call the Personal Internetworked Notary and Guardian (PING). 7 PING has been designed to capture the usage, control, and range of policies that we have previously described, many of which have been adopted as part of the national agenda. 4 It is our goal in this paper to describe an architecture that we believe would enable the implementation of the national goals and to discuss the motivation behind each architectural decision. The architecture that we describe enables individuals to have an integrated record over time and across institutions to securely store and access that record and to have finegrained control in delegating access to portions of that record. The PING architecture will support the evolution of underlying data models such as the HL7 RIM and LOINC 8 as well as specific applications that can be built to serve local needs, such as online scheduling of appointments and patient doctor communications. We want to describe the architecture for three reasons: first, to use the architectural description to fully specify the desiderata that we had previously alluded to only elliptically and thereby provide grounds for very specific agreements or disagreements with our design choices; second, to motivate others to take our free open-source code base [PING software and documentation are available under the Gnu Lesser General Public License (Gnu LGPL) at ping.chip.org] and implement PING applications and contribute their enhancements to the PING code base; third, to encourage others to provide similar transparency and disclosure in the designs of other personal health records. While it has become increasingly accepted that the largest hurdles in implementing a society-wide software solution are not technical ones, the architectures of these solutions can contribute to the difficulty or ease of addressing the societal roadblocks. To date, even when consumer groups and health care institutions have been motivated, they have been stymied by poor interoperability of software and vendor-locked, nonextensible software that does not conform to standards. 4 Furthermore, as societal concerns are likely to change, adopted architectures should allow flexibility of locus of control and capabilities. Again, not all architectures or their implementation are equally amenable to the necessary flexibility. We include below, a brief scenario to serve as a motivation of our architectural decisions. The scenario is annotated with the relevant architectural components. These components are illustrated in Figure 1 and described in detail in the following section.

2 48 SIMONS ET AL., PING Electronic Medical Record System that the dose is incorrect and that she has notified her local pharmacy. At the end of the visit, Dr. First informs Jill that given the strong family history of ovarian and breast cancer, she might want to consider genetic testing. After further discussion, Jill wants to think about it some more, and so Dr. First uploads the consent and also an order form that she can bring to, or electronically share with, a regional commercial laboratory where the blood sample would be obtained. He also asks her if she could provide him read access [Authorization Module] to the result and she immediately agrees. However, when he asks her if she would like to make her PING record available [by providing read access to a PING polling program (PING Client)] to an anonymized population-wide query of patients at high risk of breast cancer, she expresses reservations. Five weeks later, the genetic test comes back with equivocal results. It does not seem that Jill has any of the known cancer-associated mutations in the genes that they tested, but there is a novel, possibly clinically irrelevant mutation on one gene. Dr. First immediately refers her to a genetic counselor at the New Cancer Center (just across the street from WMC but a direct competitor of WMC). Jill asks her family members whether any of them have had the same test. One aunt has done so, and Jill provides her with a cover sheet that she can use to fax [PING Client] a copy of that test into the family history section of her PING record. Jill meets with the genetic counselor who was able to review, before the meeting with Jill s explicit permission, the primary documentation of the WMC studies, Jill s genetic test, her aunt s test, and all the notes and tests performed by Dr. First. Figure 1. PING layers. Scenario Jill [PING Actor] is visiting her primary care physician, Dr. First [PING Actor] who is conveniently located a half mile down the dirt road. She just has had a yearly repeat mammogram at the Women s Medical Center (WMC) 20 miles away where she loaded up her PING record with the images and reports via the WMC s patient portal [PING Client]. Dr. First reviews the mammogram and compares it with the last two, also obtained at WMC. There are no changes. As Jill is currently taking L-thyroxine for hypothyroidism, he reviews the dose, uploaded [PINGTalk, Communication Layer] into the PING record from one of the two regional pharmacy benefits management companies and notes that she is taking ten times the dose that he had prescribed. Before he has a chance to be alarmed, he sees an annotation entered by Jill in which she notes PING Overview For those who are unfamiliar with PING, it is a system designed as a fully distributed electronic medical record in which patients have control over who can read, write, or modify components of their records. It is not designed to be the primary record of the health care system but a comprehensive compilation of all medical data longitudinally across the patient s history. PING allows a patient to make and maintain his or her own electronically collated copies of his or her record encrypted in a storage site of his or her choosing. Storage sites can range from server farms to individual Internet server provider (e.g., America Online) accounts. Access, authentication, and authorization all occur on one of several available PING servers, which are also responsible for encryption of the record. To date, PING systems have shown early promise through prototype applications at Children s Hospital Boston and in primary care clinics and unconventional venues for health care (e.g., supermarkets) in Canada. The latter have been developed independently by developers using the aforementioned public open-source code base (see Validation section). Specific applications for these pilots include maintaining continuity after discharge from the emergency department and integrating the pharmacist and dietitian into the documented care of the patient. Currently, the largest PING development effort is to provide an integrated view of patient populations in the New England area under routine and disaster conditions. 9 Background The PING architecture is not the first model to address the issues involved in allowing patient access and participation in the development of their medical records. Care- Group, a multihospital and physician practice network in eastern Massachusetts, has developed an application called

3 Journal of the American Medical Informatics Association Volume 12 Number 1 Jan / Feb PatientSite 10 that seeks to address some of the aspects of personal health records. PatientSite allows patients to view portions of their medical record and annotate those portions; it can also be used by patients for nonurgent communication with their providers. As described below, the architecture of PING allows these actions and others by adopting patient ownership of their records as a primary goal. To this end, the PING server allows not only administrative-level authorization of actions, but also patient-level authorization. Another distinction is that PING is designed to allow new actions to be added to the server. Some of these actions allow and promote provider input directly into the patients PING records in standard formats. Other groups have used storage schemes similar to that of PING. In the virtual patient record system of Malamateniou and Vassilacopoulos, 11 extensible Markup Language (XML) is used as the primary means of representing patient records. Rather than relying on a single set of XML schemas, the PING data model is kept as generic as possible, as discussed below, to allow emerging document standards to be stored and the authorization on those documents to be easily maintained. PING Architecture Our primary goal in designing PING was to explicitly factor the architecture into modular pieces that could be replaced by various parties so long as there is adherence to specified core protocols. The purpose of this paper is to make this factoring explicit so that collaborators can knowledgeably add to or substitute in PING components. As diagrammed in Figure 1, the components include a PING client, a communication layer, a pluggable action-response layer, an authorization module, and a data store layer. The figure also illustrates the dataflow among these components. Each component is now described and motivated below. The PING Actor The PING actor is a user (or agent 7 ) of the PING system. Each actor in the system is assigned various attributes when his or her record is created. These attributes include roles, group memberships, and proxy representations. A role in PING is associated with certain privileges such as the ability to create records, read records, and add or update elements in records. For instance, an actor logged in with a patient role may have the ability to read and update his or her own record but not be able to create new records for others. An important note about privileges is that even though someone may have the privilege to perform an action in some records, that action may be restricted by patient-defined access policies in any particular record. In the case in which an actor has multiple potential roles (a doctor can also be a patient), the actor must designate the appropriate role upon login. Group memberships do not have privileges associated with them. Their usefulness resides in the ability of actors in the system to set access policies on their own records to allow or forbid certain actions to members of a particular group. For instance, an actor might want to specify a policy in his or her record that allows all providers in the allergy department at his or her health clinic to add documents classified as allergy documents. This can easily be accomplished if all the providers have a group membership that identifies them as part of that department. Finally, when an actor A is acting as a proxy for another actor B, all access policies on a record that are relevant to actor B are now relevant to actor A. This means that even though doctor A does not have any access policies on a patient s record that allow an update, since there are policies that allow doctor B to update, they would allow A to update as a proxy. Access decisions are discussed in more detail in the section describing the authorization module. The PING Client A PING client is any software process adherent to the PINGTalk protocol (a variant of Web services) and that interacts with the PING system via a PING server. Examples of PING clients include a Java application that provides a patient with a browsable view of his or her entire record and control of read/write/update permissions, a fax server that allows images of paper documents to be faxed into the PING record (upon authentication and authorization), and a polling application that reads a population of PING records. The implementation language or platform for the client is immaterial so long as the PING client can communicate with the PING server via the standard PINGTalk protocol. A PING client can be a software agent with any function so long as PINGTalk is adhered to and the authentication and authorization components of the protocol are observed. The PING Server The PING server is the point of access for all PING clients. It is responsible for ensuring proper authenticating, locating, and decrypting the PING records (which are often stored in sites different from the PING server) and honoring the authorization policies that are encoded in the particular patient s PING record. There is typically more than one PING server deployed even in a single system for the purpose of redundancy and load distribution (although load-balancing software has not been currently implemented). In addition, PING servers from other health care systems can access any PING record as long as they present the proper credentials. The PING server is composed of many interacting modules and layers (Fig. 1). These modules and layers are discussed below, along with a description of the communication protocol that clients use to contact the server. The PINGTalk Protocol PINGTalk is a communication protocol, based on XML messages described in a World Wide Web Consortium (W3C) XML schema, and a request-response interaction between a client and a server. The PINGTalk protocol is kept generic so that it can be easily expanded as new actions and results of those actions are defined and added to deployed PING servers. The generic PINGTalk request contains an optional session ticket that identifies the actor making the request, an action wrapper that has a description of the action that the client wants the server to perform, and all the necessary information that the server needs to process the action. Examples of this information include credentials for an authentication action, patient records to be created, query strings describing records to be read, and other information relevant to the type of action. The server responds to an action with a response that has a structure similar to that of the request but with some slight differences. Instead of an action wrapper, the response

4 50 SIMONS ET AL., PING Electronic Medical Record System contains a result wrapper that has a description of the result being returned and the result itself (specific to the action requested). The response also includes a status message indicating whether the action was performed successfully. Both request and response structures include attributes that identify themselves, the PINGTalk schema version that defines their structure and the time of issuance. The XML schema for the PINGTalk protocol is available online. 12 In the PING reference implementation, we have defined six actions and their corresponding results. The actions include creating a new record, reading an existing record, authenticating to the PING server, querying for a list of records, adding a document to a record, and updating a document within a record. The XML schemas for these actions are available online. 13 Also available is an example of the request/response messages for an authentication action. 14 The Communication Layer The communication layer is responsible for communication over various Internet protocols and the unmarshalling and marshalling of PINGTalk messages. That is, when a request is made to the server, the communication layer extracts the XML contained in the request, converts it into a usable program object, and passes it along to the action response layer. Once the action response layer has returned the appropriate object representing the XML response, the communication layer marshals the object into the protocol s response that is sent back to the requesting party. The reference implementation of the communication layer is handled by a Java 2 Enterprise Edition (J2EE) compliant Servlet. The Servlet technology provides the ability to send and receive PINGTalk messages over the Secure Hyper Text Transfer Protocol (HTTPS) 15 communication protocol. The advantages to this include inherent encryption of the PINGTalk messages through the use of HTTPS and easy manipulation of the request through the existing Java Servlet application programming interface. Although we have chosen Java Servlets for the PING reference implementation, other developers can implement the communication layer within other application frameworks and maintain interoperability with other PING servers and clients as long as adherence to the PINGTalk protocol is maintained. The Action Response Layer The action response layer contains the logic for processing registered actions and maintains information about actor sessions. Actions are registered during start up when the controller module of the layer is initialized. During the initialization phase, the controller reads a configuration file that contains the information necessary to instantiate modules that are registered to handle a particular action. The information used in instantiation typically includes definitions of data stores, authorization engines, and the type identification of actions that the module will handle. When an action request is sent to the server and passed on to the action response controller, the controller delegates the processing of the action to the registered module. The modules are responsible for enforcing their own security policies and returning a result consistent with the action. Since the modules are responsible for their own security, it is essential that the server administrator understand and trust what each module is doing. With this modular approach, the PING server can be used in any Web services environment (not just specific to personally controlled records) because the logic of responding to actions is contained in these fully pluggable modules. In our reference setup of PING for personally controlled health records, we include modules for authenticating, creating new records, adding new documents to existing records, updating existing documents in records, reading a record, and querying for sets of records. Each of these modules uses the data store and authorization engine discussed in further detail below. Upon receipt of an action, the reference modules extract the relevant information and construct authorization requests for the authorization engine. If the engine permits the request, the modules construct a result based on the type of action and information that they can retrieve from the data store. The final feature of this layer is a pluggable action extension mechanism. The mechanism is pluggable in the same manner as the action module is in that extensions are registered during the server initialization phase. Also like the action modules, extensions register for particular action events. The difference in the behavior of the extension is that it executes its task after the action module has finished, and the execution is asynchronous with the request. That is, a response is sent to the request in parallel with the execution of the extension process. To date, simple extensions have been used to report on the status of the server but more complicated extensions are being planned. One possible extension would replicate actions to a backup PING server. The Authorization Module The authorization module contains the logic for determining whether an actor is allowed to perform a particular action on a particular record or record element. Authorization for an action can be based on the policies of the action responder processing the action, the policies of the record (if any) that the action is being performed on, or a combination of both. To process these authorization requests, the module must be initialized in such a way that it can locate the relevant policies. In the case of locating responder policies, the module is initialized with a list of files, of which each contains one or more policies. In the case of locating individual record policies, the module is initialized with the data store in which the records are located. A typical action responder will have two instantiations of the authorization module (one to enforce the responder policies and one to enforce the record policies) and be coded to combine the results in a meaningful way. The PING reference authorization module is based on the Organization for the Advancement of Structured Information Standards (OASIS) Extensible Access Control Markup Language (XACML) 16 specification and uses Sun Microsystems s open-source XACML library to implement the necessary functionality. A OASIS standard, XACML, that describes both a policy language and an access control decision request/response language (both encoded in XML). 17 The policy language provides the ability to describe detailed and complex access control based on the actor making the request, the action being taken, and the resource to which the action will be applied. A major advantage of this access control model is that it is not based on a fixed hierarchy of access levels. This is especially

5 Journal of the American Medical Informatics Association Volume 12 Number 1 Jan / Feb important in a personally controlled health record such as PING in which different record owners may have different preferences concerning which individuals and groups will be allowed to view their data. That is, we explicitly reject the notion that there is a single, natural, or even fixed personal hierarchy of privacy. Depending on the idiosyncratic concerns of the individual, different items will have different privacy policies that differ from those of others and even from those at a different time in that individual s history. For example, HIV status may be of lesser concern to some individuals than the hospital at which they obtain their care. At other stages of their life, all but their resuscitation orders may be considered private by that individual. Another advantage to using the XACML policy model is that it enables the enforcement of policies at a fine-grained level. That is, policies can be written that apply to individual documents within the record, not just on the record itself. For instance, the result of reading a record for which access is denied to certain documents will appear as if those documents do not exist. Although the above module was designed primarily for personally controlled health records, it is possible to use it to restrict access to other types of targets in which there is no fixed hierarchy of access levels. Similarly, there are other models that may apply to personally controlled health records. One such model is Role-Based Access Control (RBAC). 18 Although PING is not based on a fixed hierarchy, RBAC relies on it. Also, in RBAC, the administrators of the system decide which roles get which privileges (and therefore access). In the PING model, administrators still assign roles to actors and create server side policies that grant corresponding privileges, but record owners can still block access. It is possible that, if a sufficient hierarchy of roles were devised, this model could be used by a PING implementation. However, such an implementation would limit an important aspect of PING: user control. There are two other common access control models, Discretionary Access Control (DAC) 19 and Mandatory Access Control (MAC). 20 In DAC, the owner of a particular object (a record in our case) dictates the access control on that object. That is, a record owner could grant any level of access, including write access, to his or her record to any actor regardless of which roles that actor has. In MAC, the system controls the access rights on all objects (records) and the actors have no control. In PING, that would mean that an actor with a role that has the privileges to read a record could read any record simply because he or she has that role. The disadvantages of these models are clearly their lack of flexibility in privilege granting. The PING model, however, combines the best of both without the drawbacks. The Data Store Layer The data store layer is responsible for housing all the records that the server needs access to. The layer was designed in a pluggable fashion such that a number of different types of stores can be configured for the server to use. Interaction with a store that is not currently supported by the system can be accomplished using the PING API. The API contains a Java interface that defines the method calls that the PING server uses when communicating with the back-end store. By writing a Java class that implements the PING store interface with methods that perform the correct operations, a developer can enable the use of any back-end store. There are many possibilities for a suitable data storage implementation for PING records, each with its own advantages and disadvantages. Perhaps the simplest implementation is to store all the records as a single, encrypted XML Binary Large Object (BLOB). The advantage of this scheme lies in its simplicity and its inherent privacy preservation (i.e. individual records are not identifiable without decrypting the entire store). The disadvantages of this model lie in the performance overhead incurred in decrypting a large BLOB each time that any action needs to be performed on any datum on any patient record. Another implementation that maintains the advantage of security and privacy involves maintaining a single, encrypted record BLOB for each user. The BLOB is indexed by a one-way hash (e.g., SHA-1) of the user s name. This allows faster look up of individual records, while still protecting the information contained within them. However, performance is still an issue when querying the store for records that contain specific information. One way to compensate for this is to create indices for queries that are commonly performed. For instance, during off-peak hours, the server would search through the records to identify those that belong to patients with a particular syndrome and store a list of those records in memory or as another encrypted BLOB. Users of the index would need to be made aware that the index was only valid up to the time of its creation. A further step in improving performance of a store with encrypted records is to split each individual patient record into multiple BLOBs, e.g., one BLOB per clinical category. This model further increases performance while also further decreasing privacy because the mere existence of a BLOB in a particular category may be too revealing about the corresponding record. The reference implementation of PING uses a data store that is an encrypted XML file store that follows the model of one file per user. That is, all the records are stored as files that contain digitally encrypted XML records. Other types of data stores could include relational databases and Lightweight Directory Access Protocol (LDAP) compliant directories and meta-directories. All the models described above can be implemented in any of these back-end stores. However, there are other models specific to databases and directories that use the benefits of such systems. These benefits include preexisting indices (for data that are not encrypted), optimized search, existing query languages, load balancing, and automated backup and distribution of data. The Data Model The data model for a personally controlled health record in PING is designed to be as generic as possible and yet still be capable of representing a collection of specific types of medical documents. To this end, we have adopted a philosophy of wrapping externally defined documents in an XML structure that provides information about how to interpret the documents contents. Therefore, a personally controlled record in PING is merely a collection of documents, each with meta-data that describe how that document is classified within the record, the type of document that it is, a brief description of the document s contents, and its creation and modification time.

6 52 SIMONS ET AL., PING Electronic Medical Record System The PING reference implementation has some predefined document types that will be used in the personally controlled records. Some of these documents are defined by the PING team, and others have been defined by others in collaboration with the HL7 Clinical Document Architecture Committee. The PING team has currently defined a document that contains the record owner s authentication credentials 21 and a document that contains information about the owner s actor attributes 22 (such as roles, group membership, and proxy information). Document types that represent various clinical documents for emergency department visits, clinical reports, laboratory results, and medications have been developed by HL7 and others. Our motivation for this meta-data scheme is primarily that we will not be reliant on the incomplete, emerging standards but will be able to store documents produced by them and maintain useful information for processing them. We will also maintain copies of the current versions of these document descriptions so that, in the event that they change, we will be more easily able to migrate the older versions of documents to the new standard. Validation by Example The Canadian National Research Council is adopting PING as a model for regional, provincial, and national deployment of personally controlled health records. In April 2004, a group of developers, physicians, and policy makers collaborated to implement a functioning technical and organizational prototype of a personally controlled record system for Canadian citizens with diabetes called CitizenHealth. The system includes an application at a service bureau in which patients can register and create their PING records, transfer of laboratory data from the local hospital, transfer of current prescription information from the local pharmacy, physician and nutritionist note entries, use of voice-over-ip technology for patients to enter their daily step count, and a Web portal to view and annotate the information in their record. The critical insight gained from this exercise is that the PING architecture and code base was adequately stable and well documented such that a team of programmers in another country was able, in just four weeks, to develop six new open-source applications based on a PING server and built on the PING libraries. The success of the prototype demonstrates that our model is valuable for technology diffusion through opensource development combined with maintenance of standards for interoperability. We recognize that such prototype tests are not equivalent to full-scale deployments and do not address the larger questions of social acceptability and use. However, they do answer the first-order questions of adaptability of the architecture for a variety of applications in different social/national environments. Furthermore, the goal of this paper is to describe the architectural decisions made for PING and to encourage critical feedback from the medical informatics and larger community. Discussion An overarching goal for the evolving National Health Information Infrastructure (NHII) must be a robust platform for longitudinal medical records that are integrated across sites of care. The architecture that we propose is intended to support a model of a national lifelong medical record system. Our vision is an ambitious one a nationwide, personally controlled, ubiquitous health record. Technical Limitations The system as currently deployed has technical limitations that we hope to address through continued development locally and by the open-source community and the emerging community around the NHII. One specific technical limitation that the current system faces is the lack of distributed storage. Efforts are in progress to identify existing distributed storage systems and evaluate their usefulness in the PING system. Once suitable storage systems are identified, they can be easily integrated into PING by replacing the reference data store module. Another deficiency in the current system is a robust backup and fail-over system for both the data store and the server itself. Again, a suitable distributed data storage technology will have the properties of data robustness and built-in fail-over. The issue of fail-over for the server will need to be addressed through newly developed code. A potential solution could be an extension of the action response module that replicates all transactions to a second (or any number) of PING servers deployed as slaves. PING s architecture does not specifically address synchronization with data providers (e.g., hospitals, laboratories), although we hope that our Web services based approach will provide a platform from which we can develop proper synchronization applications. Although the PING data model is capable of parsing and storing any XML-based document and the meta-data describing that document, this is not the same as being able to semantically process that document. The existing PING server and PING clients are unable to glean the meaning of arbitrary, unknown document types. We are in the process of developing a set of object identifiers that can be used to tag data elements as having particular meanings (e.g., a patient s last name) regardless of where those elements appear in a document. This process does not solve the general problem but will perhaps alleviate it in cases in which data providers are willing to tag their data but are unable, or unwilling, to format it in a PING standard manner. Notwithstanding, to the degree that the semantics of the data model standards such as HL7 s Clinical Document Architecture are specified with increasing precision, the general problem (as for other personal health records) becomes substantially more tractable. We have not addressed the issue of federating identities for patients who own multiple records on the same or different servers. To address this, we will continue to monitor the progress of groups such as the Liberty Alliance 23 and implement the concepts that they develop and promote. Another identity challenge that PING will face is the assignment of roles/groups/ proxies and the corresponding privileges. Although it is not our current goal to solve this issue, the reference authorization module and its use of XACML-based policies for the server will aid in the process of assigning privileges to existing roles. The definition of those roles/groups/proxies is an institutional issue that PING will leverage once it is solved. Finally, an ongoing challenge, although not a limitation, is for the PING team to be aware of emerging standards in all relevant areas and to be capable of adopting the new technologies and specifications.

7 Journal of the American Medical Informatics Association Volume 12 Number 1 Jan / Feb Technology Diffusion Of course, the main limitation of our approach is the enormous task required to push technology diffusion and societal acceptance. While we propose that the development proceed through an open-source model, ultimately, it is patients who must demand and use the software. There is a chicken and egg problem. PING will be the most effective and likely to be adopted if ubiquitous. Initial implementations will not be able to rely on ubiquity as a motivator, which is why early successful implementations motivated and funded by longer range planners is necessary. Recent emphasis by the Secretary of Health and Human Services on personal health records will be helpful in focusing the support of consumer groups on this problem. Furthermore, the increasing demand of patients to have copies of their medical record 24 and the increasing awareness of patients regarding modern arcana, such as the multiplicity of genetic tests for asymptomatic testing in which the medical system has not developed concomitant expertise, is likely to drive the demand for direct access and control of personal medical data. Legal There are legal issues to be elaborated that are beyond the scope of this paper. Among the desiderata to be considered: The PING system would likely not be a covered entity under the Health Insurance Portability and Accountability Act (HIPAA) nor are the patients themselves who will use PING to compile and manage their personally controlled records/information. To the extent that covered health plans or providers adopt a version of PING for their own recordkeeping purposes, the records that they create and maintain in-house using their version of PING will be subject to HIPAA s protections. Health information that these entities print or download from an individual s PING records will become subject to HIPAA once it is received by the covered entity. If a public health official or outside researcher seeks access to, or disclosure of, an individual s protected health information from a HIPAA-covered entity, the HIPAA privacy regulation would govern. To be clear, PING cannot ensure a greater degree of accountability beyond the limits of its reach: the point of authorized release of patient information to another party. Beyond that point, HIPAA s and other regulatory protections hold. Precisely because PING places the initial disclosure under patient control, it makes explicit to the receiving party the traceable responsibility of this initial data release and the implications under HIPAA. Conclusion Some organizations are beginning to grant patients electronic access to a longitudinal view of their hospital-based records. Although this approach is very encouraging, it fails to solve the problem that a patient s medical records are generally fragmented across treatment sites, posing an obstacle to clinical medicine, research, and public health efforts. A system such as PING, however, thrives in the setting of such institutional efforts because data are mobilized from legacy systems and prepared for patient consumption. PING, although still a work in progress, addresses issues of portability, security, and access control primarily for data originating in institutional, office, and laboratory records. Although there are myriad issues raised by patients reading their own records, 28 we believe that, for the foreseeable future in the United States, it is only by leveraging the patients right to have copies of their own records that we can hope to achieve effective and lifelong continuity of the medical record across all health care institutions. Since the approach of creating personally controlled health records, which we have advocated for a decade, 29 is now at the very core of the larger NHII conversation, we hope that this paper serves to help focus that conversation on the specific technical issues required to achieve the vision. References j 1. Thompson TG, Brailer DJ. The Decade of Health Information Technology: Delivering Consumer-centric and Information- Rich Health Care. Available at: materials/strategic_framework.pdf. Accessed Aug 24, The Personal Health Working Group. The Personal Health Working Group Final Report. Washington, DC: Connecting for Health: A Public-Private Collaborative, Committee on Data Standards for Patient Safety, Board on Health Care Services. Key capabilities of an electronic health record system. Washington, DC: Institute of Medicine of the National Academies, Mandl KD, Szolovits P, Kohane IS. Public standards and patients control: how to keep electronic medical records accessible but private. BMJ. 2001;322: Yasnoff WA, Humphreys BL, Overhage JM, et al. A consensus action agenda for achieving the national health information infrastructure. J Am Med Inform Assoc. 2004;11: Kim MI, Johnson KB. Personal health records: evaluation of functionality and utility. J Am Med Inform Assoc. 2002;9: Riva A, Mandl KD, Oh DH, et al. The personal internetworked notary and guardian. Int J Med Inf. 2001;62: Huff SM, Rocha RA, McDonald CJ, et al. Development of the Logical Observation Identifier Names and Codes (LOINC) vocabulary. J Am Med Inform Assoc. 1998;5: Scaleable Information Infrastructure Awards. National Library of Medicine. Available at: siiawards.html. Accessed Aug 24, PatientSite. CareGroup. Available at: harvard.edu/. Accessed Aug 24, Malamateniou F, Vassilacopoulos G. Developing a virtual patient record using XML and Web-based workflow technologies. Int J Med Inf. 2003;70: Simons W. PING Talk Schema. Available at: org/schemas/ping-talk.xsd. Accessed Aug 24, Simons W. PING Actions Schema. Available at: chip.org/schemas/ping-actions.xsd. Accessed Aug 24, Simons W. PING Talk Authentication Example. Available at: Accessed Aug 24, Rescorla E. HTTP Over TLS. Available at: org/rfc/rfc2818.txt. Accessed Aug 24, Godik S, Moses T. extensible Access Control Markup Language (XACML) Version 1.0. OASIS. Available at: Accessed Aug 24, Sun s XACML Implementation. Sun Microsystems. Available at: Accessed Aug 24, Sandhu RS, Coyne EJ, Feinstein HL, Youman CE. Role-based access control models. IEEE Comput. 1996;29: Barkley J. Discretionary Access Control. Available at: csrc.nist.gov/publications/nistpubs/800-7/node25.html. Accessed Aug 24, Barkley J. Mandatory Access Control. Available at: csrc.nist.gov/publications/nistpubs/800-7/node35.html. Accessed Aug 24, 2004.

8 54 SIMONS ET AL., PING Electronic Medical Record System 21. Simons W. PING Credentials Schema. Available at: chip.org/schemas/ping-credentials.xsd. Accessed Aug 24, Simons W. PING Actor Attributes Schema. Available at: ping.chip.org/schemas/ping-actor-attributes.xsd. Accessed Aug 24, Identity Systems and Liberty Specification Version 1.1 Interoperability. Liberty Alliance. Available at: org/resources/whitepapers/liberty%20and%203rd%20party%20 Identity%20Systems%20White%20Paper.pdf. Accessed Aug 24, Fowles JB, Kind AC, Craft C, Kind EA, Mandel JL, Adlis S. Patients interest in reading their medical record: relation with clinical and sociodemographic characteristics and patients approach to health care. Arch Intern Med. 2004;164: Harmon A. As gene test menu grows, who gets to choose? New York Times. Jul 21, 2004;National Desk Wideroff L, Freedman AN, Olson L, et al. Physician use of genetic testing for cancer susceptibility: results of a national survey. Cancer Epidemiol Biomarkers Prev. 2003;12: Sifri R, Myers R, Hyslop T, et al. Use of cancer susceptibility testing among primary care physicians. Clin Genet. 2003;64: Ross SE, Lin CT. The effects of promoting patient access to medical records: a review. J Am Med Inform Assoc. 2003;10: Szolovits P. The Guardian Angel Manifesto. Available at: Accessed Jun 12, 2004.

Towards a Norwegian Implementation of Electronic Personal Health Records

Towards a Norwegian Implementation of Electronic Personal Health Records Towards a Norwegian Implementation of Electronic Personal Health Records Torstein Jensen 1, Knut Halvor Larsen 1, and Anders Kofod-Petersen 2 1 Department of Computer and Information Science, Norwegian

More information

A Semantic Approach for Access Control in Web Services

A Semantic Approach for Access Control in Web Services A Semantic Approach for Access Control in Web Services M. I. Yagüe, J. Mª Troya Computer Science Department, University of Málaga, Málaga, Spain {yague, troya}@lcc.uma.es Abstract One of the most important

More information

U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC)

U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC) U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC) econsent Trial Project Architectural Analysis & Technical Standards Produced

More information

Role Based Access Control Framework for Network Enterprises

Role Based Access Control Framework for Network Enterprises Role Based Access Control Framework for Network Enterprises Dan Thomsen, Dick O Brien, and Jessica Bogle Secure Computing Corporation 2675 Long Lake Road Roseville, MN 55113 thomsen@securecomputing.com

More information

Business Process Management with @enterprise

Business Process Management with @enterprise Business Process Management with @enterprise March 2014 Groiss Informatics GmbH 1 Introduction Process orientation enables modern organizations to focus on the valueadding core processes and increase

More information

Health Record Banking Alliance White Paper

Health Record Banking Alliance White Paper Health Record Banking Alliance White Paper A Proposed National Infrastructure for HIE Using Personally Controlled Records January 4, 2013 Table of Contents Executive Summary...3 I. Overview...5 II. Architectural

More information

Technical. Overview. ~ a ~ irods version 4.x

Technical. Overview. ~ a ~ irods version 4.x Technical Overview ~ a ~ irods version 4.x The integrated Ru e-oriented DATA System irods is open-source, data management software that lets users: access, manage, and share data across any type or number

More information

TOP SECRETS OF CLOUD SECURITY

TOP SECRETS OF CLOUD SECURITY TOP SECRETS OF CLOUD SECURITY Protect Your Organization s Valuable Content Table of Contents Does the Cloud Pose Special Security Challenges?...2 Client Authentication...3 User Security Management...3

More information

SOA REFERENCE ARCHITECTURE: WEB TIER

SOA REFERENCE ARCHITECTURE: WEB TIER SOA REFERENCE ARCHITECTURE: WEB TIER SOA Blueprint A structured blog by Yogish Pai Web Application Tier The primary requirement for this tier is that all the business systems and solutions be accessible

More information

Overview. Edvantage Security

Overview. Edvantage Security Overview West Virginia Department of Education (WVDE) is required by law to collect and store student and educator records, and takes seriously its obligations to secure information systems and protect

More information

CLARIN-NL Third Call: Closed Call

CLARIN-NL Third Call: Closed Call CLARIN-NL Third Call: Closed Call CLARIN-NL launches in its third call a Closed Call for project proposals. This called is only open for researchers who have been explicitly invited to submit a project

More information

Cloud-based Identity and Access Control for Diagnostic Imaging Systems

Cloud-based Identity and Access Control for Diagnostic Imaging Systems Cloud-based Identity and Access Control for Diagnostic Imaging Systems Weina Ma and Kamran Sartipi Department of Electrical, Computer and Software Engineering University of Ontario Institute of Technology

More information

RAYSAFE S1 SECURITY WHITEPAPER VERSION B. RaySafe S1 SECURITY WHITEPAPER

RAYSAFE S1 SECURITY WHITEPAPER VERSION B. RaySafe S1 SECURITY WHITEPAPER RaySafe S1 SECURITY WHITEPAPER Contents 1. INTRODUCTION 2 ARCHITECTURE OVERVIEW 2.1 Structure 3 SECURITY ASPECTS 3.1 Security Aspects for RaySafe S1 Data Collector 3.2 Security Aspects for RaySafe S1 cloud-based

More information

Secure Semantic Web Service Using SAML

Secure Semantic Web Service Using SAML Secure Semantic Web Service Using SAML JOO-YOUNG LEE and KI-YOUNG MOON Information Security Department Electronics and Telecommunications Research Institute 161 Gajeong-dong, Yuseong-gu, Daejeon KOREA

More information

Supporting in- and off-hospital Patient Management Using a Web-based Integrated Software Platform

Supporting in- and off-hospital Patient Management Using a Web-based Integrated Software Platform Digital Healthcare Empowering Europeans R. Cornet et al. (Eds.) 2015 European Federation for Medical Informatics (EFMI). This article is published online with Open Access by IOS Press and distributed under

More information

Property & Casualty Insurance Solutions from CCS Technology Solutions

Property & Casualty Insurance Solutions from CCS Technology Solutions Property & Casualty Insurance Solutions from CCS Technology Solution presents OneTimePortal (Powered by WEBSPHERE), Web-based software platform for property and casualty insurers that are seeking to reduce

More information

Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft

Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft 5.6 Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft logo, Jaspersoft ireport Designer, JasperReports Library, JasperReports Server, Jaspersoft

More information

A Federated Authorization and Authentication Infrastructure for Unified Single Sign On

A Federated Authorization and Authentication Infrastructure for Unified Single Sign On A Federated Authorization and Authentication Infrastructure for Unified Single Sign On Sascha Neinert Computing Centre University of Stuttgart Allmandring 30a 70550 Stuttgart sascha.neinert@rus.uni-stuttgart.de

More information

Managing Users and Identity Stores

Managing Users and Identity Stores CHAPTER 8 Overview ACS manages your network devices and other ACS clients by using the ACS network resource repositories and identity stores. When a host connects to the network through ACS requesting

More information

Key Management Interoperability Protocol (KMIP)

Key Management Interoperability Protocol (KMIP) (KMIP) Addressing the Need for Standardization in Enterprise Key Management Version 1.0, May 20, 2009 Copyright 2009 by the Organization for the Advancement of Structured Information Standards (OASIS).

More information

Implementing XML-based Role and Schema Migration Scheme for Clouds

Implementing XML-based Role and Schema Migration Scheme for Clouds Implementing XML-based Role and Schema Migration Scheme for Clouds Gurleen Kaur 1, Sarbjeet Singh 2 Computer Science and Engineering, UIET Panjab University, Chandigarh, India 1 gurleenturka@gmail.com

More information

IGI Portal architecture and interaction with a CA- online

IGI Portal architecture and interaction with a CA- online IGI Portal architecture and interaction with a CA- online Abstract In the framework of the Italian Grid Infrastructure, we are designing a web portal for the grid and cloud services provisioning. In following

More information

Smartphone Enterprise Application Integration

Smartphone Enterprise Application Integration WHITE PAPER MARCH 2011 Smartphone Enterprise Application Integration Rhomobile - Mobilize Your Enterprise Overview For more information on optimal smartphone development please see the Rhomobile White

More information

Web Service Authorization Framework

Web Service Authorization Framework Web Service Authorization Framework Thomas Ziebermayr, Stefan Probst Software Competence Center Hagenberg, Hauptstrasse 99, 4232 Hagenberg, Austria thomas.ziebermayr@scch.at, stefan.probst@scch.at Abstract

More information

Extended RBAC Based Design and Implementation for a Secure Data Warehouse

Extended RBAC Based Design and Implementation for a Secure Data Warehouse Extended RBAC Based Design and Implementation for a Data Warehouse Dr. Bhavani Thuraisingham The University of Texas at Dallas bhavani.thuraisingham@utdallas.edu Srinivasan Iyer The University of Texas

More information

www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013

www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,

More information

Recognition and Privacy Preservation of Paper-based Health Records

Recognition and Privacy Preservation of Paper-based Health Records Quality of Life through Quality of Information J. Mantas et al. (Eds.) IOS Press, 2012 2012 European Federation for Medical Informatics and IOS Press. All rights reserved. doi:10.3233/978-1-61499-101-4-751

More information

Secure Authentication and Session. State Management for Web Services

Secure Authentication and Session. State Management for Web Services Lehman 0 Secure Authentication and Session State Management for Web Services Clay Lehman CSC 499: Honors Thesis Supervised by: Dr. R. Michael Young Lehman 1 1. Introduction Web services are a relatively

More information

Exploring ADSS Server Signing Services

Exploring ADSS Server Signing Services ADSS Server is a multi-function server providing digital signature creation and signature verification services, as well as supporting other infrastructure services including Time Stamp Authority (TSA)

More information

Unlocking the Power of SOA with Business Process Modeling

Unlocking the Power of SOA with Business Process Modeling White Paper Unlocking the Power of SOA with Business Process Modeling Business solutions through information technology TM Entire contents 2006 by CGI Group Inc. All rights reserved. Reproduction of this

More information

Best Practices: Extending Enterprise Applications to Mobile Devices

Best Practices: Extending Enterprise Applications to Mobile Devices Best Practices: Extending Enterprise Applications to Mobile Devices by Kulathumani Hariharan Summary: Extending enterprise applications to mobile devices is increasingly becoming a priority for organizations

More information

Oracle Identity Analytics Architecture. An Oracle White Paper July 2010

Oracle Identity Analytics Architecture. An Oracle White Paper July 2010 Oracle Identity Analytics Architecture An Oracle White Paper July 2010 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may

More information

Whitepaper: Manage Access Control for Network Resources with Securitay s Security Policy Manager

Whitepaper: Manage Access Control for Network Resources with Securitay s Security Policy Manager Whitepaper: Manage Access Control for Network Resources with Securitay s Security Policy Manager Introduction The past several years has seen an increase in the amount of attention paid to security management

More information

Security in Internet of Things using Delegation of Trust to a Provisioning Server

Security in Internet of Things using Delegation of Trust to a Provisioning Server Security in Internet of Things using Delegation of Trust to a Provisioning Server Architecture overview Peter Waher Clayster Laboratorios Chile S.A, Blanco 1623, of. 1402, Valparaíso, Chile peter.waher@clayster.com

More information

zen Platform technical white paper

zen Platform technical white paper zen Platform technical white paper The zen Platform as Strategic Business Platform The increasing use of application servers as standard paradigm for the development of business critical applications meant

More information

A Model for Access Control Management in Distributed Networks

A Model for Access Control Management in Distributed Networks A Model for Access Control Management in Distributed Networks Master of Science Thesis Azadeh Bararsani Supervisor/Examiner: Dr. Johan Montelius Royal Institute of Technology (KTH), Stockholm, Sweden,

More information

Internet File Management & HIPAA A Practical Approach towards Responding to the Privacy Regulation of the Act

Internet File Management & HIPAA A Practical Approach towards Responding to the Privacy Regulation of the Act White Paper Internet File Management & HIPAA A Practical Approach towards Responding to the Privacy Regulation of the Act The recent activation of the privacy requirement of the Health Insurance Portability

More information

How To Secure Your Data Center From Hackers

How To Secure Your Data Center From Hackers Xerox DocuShare Private Cloud Service Security White Paper Table of Contents Overview 3 Adherence to Proven Security Practices 3 Highly Secure Data Centers 4 Three-Tier Architecture 4 Security Layers Safeguard

More information

Harmonized Use Case for Electronic Health Records (Laboratory Result Reporting) March 19, 2006

Harmonized Use Case for Electronic Health Records (Laboratory Result Reporting) March 19, 2006 Harmonized Use Case for Electronic Health Records (Laboratory Result Reporting) March 19, 2006 Office of the National Coordinator for Health Information Technology (ONC) Table of Contents American Health

More information

Table of Contents. Page 1

Table of Contents. Page 1 Table of Contents Executive Summary... 2 1 CPSA Interests and Roles in ehealth... 4 1.1 CPSA Endorsement of ehealth... 4 1.2 CPSA Vision for ehealth... 5 1.3 Dependencies... 5 2 ehealth Policies and Trends...

More information

1. Introduction 1.1 Methodology

1. Introduction 1.1 Methodology Table of Contents 1. Introduction 1.1 Methodology 3 1.2 Purpose 4 1.3 Scope 4 1.4 Definitions, Acronyms and Abbreviations 5 1.5 Tools Used 6 1.6 References 7 1.7 Technologies to be used 7 1.8 Overview

More information

Cross-domain Identity Management System for Cloud Environment

Cross-domain Identity Management System for Cloud Environment Cross-domain Identity Management System for Cloud Environment P R E S E N T E D B Y: N A Z I A A K H TA R A I S H A S A J I D M. S O H A I B FA R O O Q I T E A M L E A D : U M M E - H A B I B A T H E S

More information

A Java proxy for MS SQL Server Reporting Services

A Java proxy for MS SQL Server Reporting Services 1 of 5 1/10/2005 9:37 PM Advertisement: Support JavaWorld, click here! January 2005 HOME FEATURED TUTORIALS COLUMNS NEWS & REVIEWS FORUM JW RESOURCES ABOUT JW A Java proxy for MS SQL Server Reporting Services

More information

ConnectVirginia EXCHANGE Onboarding and Certification Guide. Version 1.4

ConnectVirginia EXCHANGE Onboarding and Certification Guide. Version 1.4 ConnectVirginia EXCHANGE Onboarding and Certification Guide Version 1.4 July 18, 2012 CONTENTS 1 Overview... 5 2 Intended Audience... 5 3 ConnectVirginia Background... 5 3.1 Federated... 5 3.2 Secure...

More information

THE CCLRC DATA PORTAL

THE CCLRC DATA PORTAL THE CCLRC DATA PORTAL Glen Drinkwater, Shoaib Sufi CCLRC Daresbury Laboratory, Daresbury, Warrington, Cheshire, WA4 4AD, UK. E-mail: g.j.drinkwater@dl.ac.uk, s.a.sufi@dl.ac.uk Abstract: The project aims

More information

A Generic Database Web Service

A Generic Database Web Service A Generic Database Web Service Erdogan Dogdu TOBB Economics and Technology University Computer Engineering Department Ankara, Turkey edogdu@etu.edu.tr Yanchao Wang and Swetha Desetty Georgia State University

More information

AN ENHANCED ATTRIBUTE BASED ENCRYPTION WITH MULTI PARTIES ACCESS IN CLOUD AREA

AN ENHANCED ATTRIBUTE BASED ENCRYPTION WITH MULTI PARTIES ACCESS IN CLOUD AREA Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

HPC PORTAL DEVELOPMENT PLATFORM

HPC PORTAL DEVELOPMENT PLATFORM HPC PORTAL DEVELOPMENT PLATFORM Chien-Heng Wu, National Center for High-Performance Computing, garywu@nchc.org.tw ABSTRACT In the world of information technology, enterprise applications must be designed,

More information

OpenHRE Security Architecture. (DRAFT v0.5)

OpenHRE Security Architecture. (DRAFT v0.5) OpenHRE Security Architecture (DRAFT v0.5) Table of Contents Introduction -----------------------------------------------------------------------------------------------------------------------2 Assumptions----------------------------------------------------------------------------------------------------------------------2

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,

More information

Authentication Integration

Authentication Integration Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication

More information

A Survey Study on Monitoring Service for Grid

A Survey Study on Monitoring Service for Grid A Survey Study on Monitoring Service for Grid Erkang You erkyou@indiana.edu ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide

More information

Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines

Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines Ameritas Single Sign-On (SSO) and Enterprise SAML Standard Architectural Implementation, Patterns and Usage Guidelines 1 Background and Overview... 3 Scope... 3 Glossary of Terms... 4 Architecture Components...

More information

VMware Mirage Web Manager Guide

VMware Mirage Web Manager Guide Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Replication and High-Availability

Replication and High-Availability ConfD XML-Based Network Management Software Next-Generation Configuration Management The increasing complexity of operator and enterprise networks and the requirement to deliver new services is driving

More information

Session Service Architecture

Session Service Architecture Session Service Architecture Open Web Single Sign-On Version 1.0 Please send comments to: opensso@sun.com Author Alan Chu (alan.chu@sun.com) Session Service Architecture, Version 1.0 This document is subject

More information

Title Draft Pan-Canadian Primary Health Care Electronic Medical Record Content Standard, Version 2.0 Data Extract Specifi cation Business View

Title Draft Pan-Canadian Primary Health Care Electronic Medical Record Content Standard, Version 2.0 Data Extract Specifi cation Business View pic Title Draft Pan-Canadian Primary Health Care Electronic Medical Record Content Standard, Version 2.0 Data Extract Specifi cation Business View Primary Health Care Who We Are Established in 1994, CIHI

More information

INTRODUCTION. The HIPAA Privacy Rule and Electronic Health Information Exchange in a Networked Environment

INTRODUCTION. The HIPAA Privacy Rule and Electronic Health Information Exchange in a Networked Environment INTRODUCTION This guidance is composed of a series of fact sheets that clarify how the HIPAA Privacy Rule applies to, and can be used to help structure the privacy policies behind, electronic health information

More information

Norwegian e-health Infrastructure based on XML, ebxml and PKI

Norwegian e-health Infrastructure based on XML, ebxml and PKI An OASIS Case Study Norwegian e-health Infrastructure based on XML, ebxml and PKI Trygdeetaten Case Study By Pim van der Eijk For OASIS OASIS (Organization for the Advancement of Structured Information

More information

Introduction to SAML

Introduction to SAML Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments

More information

Alliance Key Manager Solution Brief

Alliance Key Manager Solution Brief Alliance Key Manager Solution Brief KEY MANAGEMENT Enterprise Encryption Key Management On the road to protecting sensitive data assets, data encryption remains one of the most difficult goals. A major

More information

Ten Principles for Fostering. Development of an iphone like Platform. for Healthcare Information Technology. June 2009. www.chip.

Ten Principles for Fostering. Development of an iphone like Platform. for Healthcare Information Technology. June 2009. www.chip. Ten Principles for Fostering Development of an iphone like Platform for Healthcare Information Technology June 2009 www.chip.org/platform Children s Hospital Informatics Program at Harvard MIT Health Sciences

More information

The Personal Medical Unit A Ubiquitous Computing Infrastructure for Personal Pervasive Healthcare

The Personal Medical Unit A Ubiquitous Computing Infrastructure for Personal Pervasive Healthcare The Personal Medical Unit A Ubiquitous Computing Infrastructure for Personal Pervasive Healthcare Jakob E. Bardram Centre for Pervasive Healthcare Department of Computer Science, University of Aarhus Aabogade

More information

IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide

IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide IBM SPSS Collaboration and Deployment Services Version 6 Release 0 Single Sign-On Services Developer's Guide Note Before using this information and the product it supports, read the information in Notices

More information

Information Technology Services

Information Technology Services Information Technology Services The purpose of an Information Technology Standard is to specify requirements for compliance with Old Dominion University Information Technology policies, other University

More information

Binonymizer A Two-Way Web-Browsing Anonymizer

Binonymizer A Two-Way Web-Browsing Anonymizer Binonymizer A Two-Way Web-Browsing Anonymizer Tim Wellhausen Gerrit Imsieke (Tim.Wellhausen, Gerrit.Imsieke)@GfM-AG.de 12 August 1999 Abstract This paper presents a method that enables Web users to surf

More information

In this chapter, we will introduce works related to our research. First, we will

In this chapter, we will introduce works related to our research. First, we will Chapter 2 Related Works In this chapter, we will introduce works related to our research. First, we will present the basic concept of directory service and Lightweight Directory Access Protocol (LDAP).

More information

Health Record Banking Alliance

Health Record Banking Alliance Health Record Banking Alliance From: William A. Yasnoff, MD, PhD, President, Health Record Banking Alliance To: Regulations.Gov Website at http://www.regulations.gov/search/regs/home.html#home Date: May

More information

Distributed Identity Management Model for Digital Ecosystems

Distributed Identity Management Model for Digital Ecosystems International Conference on Emerging Security Information, Systems and Technologies Distributed Identity Management Model for Digital Ecosystems Hristo Koshutanski Computer Science Department University

More information

Access Control Framework of Personal Cloud based on XACML

Access Control Framework of Personal Cloud based on XACML Access Control Framework of Personal Cloud based on XACML 1 Jun-Young Park, 2 Young-Rok Shin, 3 Kyoung-Hun Kim, 4 Eui-Nam Huh 1First Author, 2 Kyung Hee University, {parkhans, shinyr}@khu.ac.kr 3 Gangdong

More information

Secure information storage

Secure information storage Secure information storage in a private cloud built upon local network resources Student Project for Large Installation Administration Master of Science in System and Network Engineering Universiteit van

More information

HPC Portal Development Platform with E-Business and HPC Portlets

HPC Portal Development Platform with E-Business and HPC Portlets HPC Portal Development Platform with E-Business and HPC Portlets CHIEN-HENG WU National Center for High-Performance Computing, Hsin-Chu, 300, Taiwan E-mail: garywu@nchc.org.tw Abstract HPC Portal Development

More information

1-04-10 Configuration Management: An Object-Based Method Barbara Dumas

1-04-10 Configuration Management: An Object-Based Method Barbara Dumas 1-04-10 Configuration Management: An Object-Based Method Barbara Dumas Payoff Configuration management (CM) helps an organization maintain an inventory of its software assets. In traditional CM systems,

More information

1 What Are Web Services?

1 What Are Web Services? Oracle Fusion Middleware Introducing Web Services 11g Release 1 (11.1.1) E14294-04 January 2011 This document provides an overview of Web services in Oracle Fusion Middleware 11g. Sections include: What

More information

E-HEALTH PLATFORMS AND ARCHITECTURES

E-HEALTH PLATFORMS AND ARCHITECTURES E-HEALTH PLATFORMS AND ARCHITECTURES E-Government Andreas Meier Nicolas Werro University of Fribourg Alfredo Santa Cruz 19.01.2007 Contents 1. Introduction 2. Existing Capabilities and Strategic Approach

More information

Network-based Access Control

Network-based Access Control Chapter 4 Network-based Access Control 4.1 Rationale and Motivation Over the past couple of years, a multitude of authentication and access control technologies have been designed and implemented. Although

More information

Electronic Health Network - Case Study Consent2Share Share with Confidence

Electronic Health Network - Case Study Consent2Share Share with Confidence Electronic Health Network - Case Study Consent2Share Share with Confidence Jan 2015 About Consent2Share Complying with privacy regulations in an electronic environment is a very complex process. The Consent2Share

More information

XACML and Access Management. A Business Case for Fine-Grained Authorization and Centralized Policy Management

XACML and Access Management. A Business Case for Fine-Grained Authorization and Centralized Policy Management A Business Case for Fine-Grained Authorization and Centralized Policy Management Dissolving Infrastructures A recent Roundtable with CIOs from a dozen multinational companies concurred that Identity &

More information

bbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5

bbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5 bbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5 2008 Adobe Systems Incorporated. All rights reserved. Adobe Flash Media Rights Management Server 1.5 Overview for Microsoft

More information

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based

More information

The MDPHnetDistributed Querying Approach for Public Health. Jeffrey Brown, PhD MichealKlompas, MD, MPH MDPHnet Research Team October 18, 2012

The MDPHnetDistributed Querying Approach for Public Health. Jeffrey Brown, PhD MichealKlompas, MD, MPH MDPHnet Research Team October 18, 2012 The MDPHnetDistributed Querying Approach for Public Health Jeffrey Brown, PhD MichealKlompas, MD, MPH MDPHnet Research Team October 18, 2012 1 Approach to Distributed Querying 2 Distributed Querying Guiding

More information

EMC PERSPECTIVE. The Private Cloud for Healthcare Enables Coordinated Patient Care

EMC PERSPECTIVE. The Private Cloud for Healthcare Enables Coordinated Patient Care EMC PERSPECTIVE The Private Cloud for Healthcare Enables Coordinated Patient Care Table of Contents A paradigm shift for Healthcare IT...................................................... 3 Cloud computing

More information

Genomics and the EHR. Mark Hoffman, Ph.D. Vice President Research Solutions Cerner Corporation

Genomics and the EHR. Mark Hoffman, Ph.D. Vice President Research Solutions Cerner Corporation Genomics and the EHR Mark Hoffman, Ph.D. Vice President Research Solutions Cerner Corporation Overview EHR from Commercial Perspective What can be done TODAY? What could be done TOMORROW? What are some

More information

Oracle Sales Cloud Securing Oracle Sales Cloud. Release 10

Oracle Sales Cloud Securing Oracle Sales Cloud. Release 10 Oracle Sales Cloud Securing Release 10 Oracle Sales Cloud Securing Part Number E61255-03 Copyright 2011-2015, Oracle and/or its affiliates. All rights reserved. Authors: Shannon Connaire, Scott Dunn, David

More information

SOA, case Google. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901.

SOA, case Google. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901 SOA, case Google Written by: Sampo Syrjäläinen, 0337918 Jukka Hilvonen, 0337840 1 Contents 1.

More information

CryptoNET: Security Management Protocols

CryptoNET: Security Management Protocols CryptoNET: Security Management Protocols ABDUL GHAFOOR ABBASI, SEAD MUFTIC CoS, School of Information and Communication Technology Royal Institute of Technology Borgarfjordsgatan 15, SE-164 40, Kista,

More information

An identity management solution. TELUS AD Sync

An identity management solution. TELUS AD Sync An identity management solution TELUS AD Sync June 2013 Introduction An important historic challenge faced by small and mid-sized businesses when opting for the TELUS Business E-mail Service is the requirement

More information

HL7 and SOA Based Distributed Electronic Patient Record Architecture Using Open EMR

HL7 and SOA Based Distributed Electronic Patient Record Architecture Using Open EMR HL7 and SOA Based Distributed Electronic Patient Record Architecture Using Open EMR Priti Kalode 1, Dr Onkar S Kemkar 2, Dr P R Gundalwar 3 Research Student, Dept of Comp Sci &Elec, RTM Nagpur University

More information

Sophos Mobile Control Technical guide

Sophos Mobile Control Technical guide Sophos Mobile Control Technical guide Product version: 2 Document date: December 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory

More information

How To Create A C++ Web Service

How To Create A C++ Web Service A Guide to Creating C++ Web Services WHITE PAPER Abstract This whitepaper provides an introduction to creating C++ Web services and focuses on:» Challenges involved in integrating C++ applications with

More information

Xerox DocuShare Security Features. Security White Paper

Xerox DocuShare Security Features. Security White Paper Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a

More information

Introduction into Web Services (WS)

Introduction into Web Services (WS) (WS) Adomas Svirskas Agenda Background and the need for WS SOAP the first Internet-ready RPC Basic Web Services Advanced Web Services Case Studies The ebxml framework How do I use/develop Web Services?

More information

Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions.

Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions. Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH White Paper February 2010 www.alvandsolutions.com Overview Today s increasing security threats and regulatory

More information

How To Take Advantage Of Active Directory Support In Groupwise 2014

How To Take Advantage Of Active Directory Support In Groupwise 2014 White Paper Collaboration Taking Advantage of Active Directory Support in GroupWise 2014 Flexibility and interoperability have always been hallmarks for Novell. That s why it should be no surprise that

More information

Credibly secure cloud storage with elfcloud

Credibly secure cloud storage with elfcloud Credibly secure cloud storage with elfcloud Privacy of private clouds with the cost of the public cloud Datacenter IaaS workshop 2014 / 12.9.2014 Tuomas Tonteri Founder and CEO Abstract elfcloud is a Finland

More information

CA Performance Center

CA Performance Center CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

Base One's Rich Client Architecture

Base One's Rich Client Architecture Base One's Rich Client Architecture Base One provides a unique approach for developing Internet-enabled applications, combining both efficiency and ease of programming through its "Rich Client" architecture.

More information

owncloud Architecture Overview

owncloud Architecture Overview owncloud Architecture Overview Time to get control back Employees are using cloud-based services to share sensitive company data with vendors, customers, partners and each other. They are syncing data

More information

Nationwide and Regional Health Information Networks and Federated Identity for Authentication and HIPAA Compliance

Nationwide and Regional Health Information Networks and Federated Identity for Authentication and HIPAA Compliance Nationwide and Regional Health Information Networks and Federated Identity for Authentication and HIPAA Compliance Christina Stephan, MD Co-Chair Liberty Alliance ehealth SIG National Library of Medicine

More information

Integration of SAP central user administration with Microsoft Active Directory

Integration of SAP central user administration with Microsoft Active Directory Collaboration Technology Support Center Microsoft - Collaboration Brief June 2005 Integration of SAP central user administration with Microsoft Active Directory Chris Kohlsdorf, Senior System Architect

More information